report a problem mobile device support computer and software support campus technology support
WSCC Computing Policies
Copyright Laws and Fair Use

Copyright Laws and Fair Use Copyright laws apply to electronic publishing as well as to print publishing. Publishers must have permission to publish any copyrighted information. Copyright information includes not only text based information but also graphics, sound clips, animations, and photographs. Electronic publications are subject to the same college policies and standards as print publications.

Use of copied information in an educational institutional setting is based on the Fair Use clause in Section 107 of the U.S. Copyright Act of 1976. This clause allows allows for multiple copies for classroom use provided that this copying meets its criteria for brevity, spontaneity, and cumulative effect. These criteria are defined as follows:

Brevity: a complete poem if less than 250 words or an excerpt of not more than 250 words; a complete prose work of less than 2500 words or an excerpt of not more than 1000 words, or 10% of the work, whichever is less, but a minimum of 500 words;

Spontaneity: the copying is at the inspiration of the individual teacher and the decision to use the work is such that it is unreasonable to expect a timely reply to a request for permission;

Cumulative Effect: the copying is for only one course in the school in which the copies are made; not more than one short poem or prose work or more than two excerpts may be copied from the same author nor more than three copies from the same collective work or periodical volume during one class term; and there should be no more than nine instances of such multiple copying for one course during one class term.

More information on US copyright laws can be obtained from the following Library of Congress and the Cornell Law Library on the Internet:


Information on copyright and multimedia can be found at:

* Fair Use Guidelines for Educational Multimedia and Related Documents and Links

-Back to top


Digital Millennium Copyright Act (DMCA)

Walters State Community College subscribes to the requirements of the Digital Millennium Copyright Act (DMCA) of 1998. Consistent with the act, Walters State has an associated institutional DMCA Copyright Policy and a Code of Computer Practices providing notice of copyright responsibility for all users of college computers and web resources. Additionally, the college has designated an agent to receive notification of claimed infringement from copyright owners. The college's agent (Debbie Scott) may be reached via e-mail at

This document is a copy of the "Code of Computing Practice" published in the Walters State Community College 2002 - 2003 Student Handbook.

-Back to top


Code of Computing Practice

Computer resources at Walters State Community College are available to all students, faculty, and staff for authorized use in a responsible, ethical, and equitable manner. It is important that all users of the computing facilities conduct their computing activities in this manner since they have access to many valuable and sensitive resources and their computing practices can adversely affect the work of other users. The following constitutes a code of computing practices to be adhered to by all users of the computer systems.

1. Users must obtain official approval from the department responsible for use of the computing resources. Approval will not be granted to use computing facilities that do not conform to the missions, processes, and functions of the Institution.

2. Users of computing resources are expected to conduct themselves in a manner that does not constitute a danger or threat to any person’s health, safety, or interfere with authorized individual and institutional activities. Use of computing resources to view or transmit obscene material is prohibited.

3. Users must not misuse, damage or misappropriate in any manner computing equipment, software, property, and other facilities and resources.

4. Users must utilize only those computers which have been authorized for their use and for the purposes for which the authorization was granted.

5. Users of the computer systems are responsible for the use of their computer accounts and, as such they should take precautions against others obtaining access to their computer accounts. This includes managing and controlling the use of individual passwords, operational activities, and resource utilization.

6. Users must follow the established procedures for accessing the computing systems. All computing work must be readily identified with the user’s own name and where applicable the relevant department name.

7. Users may not access, modify, or copy programs, files, data of any sort belonging to other users or to Walters State Community College without obtaining prior authorization to do so from the other user and/or department involved. Similarly programs, subroutines, data, equipment, and other computing related resources may not be taken to other computer installations without the proper department and/or Walters State Computer Services Department authorization and a clearly defined understanding of the responsibilities associated with such action (e.g. security of access to the data at the other computer installation).

8. Users may not use programs, data, equipment, and other computing related resources or other computer sites at Walters State for other than officially scheduled and sanctioned academic and administrative purposes unless prior approval has been obtained from the department responsible for the computer and the Walters State Computer Services Director.

9. Users should minimize the impact of their work on the work of other Users. Attempts should not be made to encroach on others’ use of the facilities or deprive them of resources. Game-Playing that is not part of an authorized program of study must not interfere with users’ rights to access a system for educational purposes.

10. Users must not attempt to modify system facilities and/or subvert the restrictions associated with their assigned use of computers.

The above code is intended to work to the benefit of all Computer Services users by encouraging responsible conduct and use of computing resources. Disciplinary action for violating this code shall be governed by the applicable provisions of student handbooks, faculty and staff handbooks, and other policies and procedures of Walters State Community College, its governing body, the Tennessee Board of Regents and the applicable state and federal laws. The General Regulations on Student Conduct and Disciplinary Sanctions outline some, but are not limited to, actions that may be taken either singularly or in combination by the Institution against violators of this code.

-Back to top


Tennessee Education Cooperative Network (TECnet)

The Tennessee Educational Cooperative Network (TECnet) mission is stated as:

"It is the primary purpose of TECnet to provide data connectivity to non-profit institutions/agencies in the Tennessee region which have as their primary purpose academic and research activities and to state and local governments."

The TECnet is for the use of persons legitimately associated with current institutional members and other institutions/agencies in the Tennessee region that choose to join the TECnet and agree to abide by the appropriate usage conventions and any terms and conditions of membership and affiliation of the TECnet, as they may be amended from time to time. The TECnet will support the primary functions of the academic and research institutions, that is, instruction, research, public service, and the accompanying administrative support functions by facilitating the exchange of information consistent with the purposes of the cooperating institutions/agencies. Functions of state and local government members may likewise be facilitated by the use of the TECnet.

The TECnet is open to use, at the discretion of the individual educational institutions, by faculty, students, and staff affiliated with that institution/agency and by state and local government members. Users of the TECnet are expected to be responsible in their use and are subject to approval of their institution/agency. Each institution/agency is responsible to see that the acceptable use policy is widely distributed, that the TECnet users are aware of the policy, and that these policies are followed. Each institution/agency is responsible for exercising any control they deem necessary to maintain usage within the confines of the acceptable use policy.

Information that is transmitted over the network is not routinely encrypted or made private between sender and the addressee. Anyone who can intercept the transmission has access to the information as if it were addressed to the interceptor. To intercept any transmission is a criminal offense.

Guidelines for use of the network are as follows. Other acceptable and unacceptable usage can be derived from these examples.

Individual usage of the TECnet should be consistent with the goals and purposes of the TECnet.

The TECnet should not be used for any activity that does not support the mission and purposes of the individual institution/agency. If a particular usage is not in the best interest of the institution/agency or if it does not support the mission and purposes, then it should not be done.

The TECnet should not be used for commercial purposes.

Deliberate disruption of anyone's work or system is prohibited.

The TECnet should not be used for any unlawful purposes. It is NOT acceptable to use TECnet to transmit threatening, obscene, or harassing materials. Attempts to penetrate a remote site without proper authorization is strictly forbidden and also violates the Tennessee Code Annotated which state suitable punishment for violators.

If institutions are allowed to use gateways to other networks, all rules and conventions of the other networks must be followed. The institution/agency having access to other network should obtain and abide by that other network's acceptable use policy.

Institutions/agencies are forbidden to use the TECnet to gain access to any other network which requires membership if the accessing institution/agency does not have proper membership, rights, and privileges in the other network.

Disruption of any activity on a remote node is forbidden. Users should not do anything concerning remote nodes that will cause the loss or corruption of data, the abnormal use of computing resources, or the introduction of computer viruses by any means.

Authority for the TECnet acceptable use policies lies with the senior computing officers of the participating institutions/agencies as advised by the TECnet Advisory Committee and the TECnet Network Operations Center. Interpretation of questionable acceptable usage will be determined by the TECnet Advisory Committee, and recommendations will be made to the senior computing officers of the participating institutions/agencies. Until an issue is resolved, questionable use should be considered "not acceptable."

Approved by TAC 12/15/94

-Back to top

Section Menu

Copyright Laws and Fair Use

Digital Millennium Copyright Act (DMCA)

Code Of Computing Practice

Tennessee Education Cooperative Network (TECnet)